Network security essentials applications and standards

Intended for college courses and professional readers where the interest is primarily in the application of network security, without the need to delve deeply into cryptographic theory and principles (system engineer, programmer, system manager, network manager, product marketing personnel, system s...

Full description

Saved in:
Bibliographic Details
Main Author: Stallings, William
Format: Book
Language:English
Published: Harlow, Essex Pearson Educational Limited 2014
Edition:Fifth edition, international edition
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 a 4500
001 98974
003 MY-KLNDU
005 20241220023019.0
008 141013s2014 enka bi 000 0 eng d
020 |a 9780273793366 (pbk) 
020 |a 0273793365 (pbk) 
039 9 |a 201504111632  |b zul  |c 201412111206  |d shahrim  |c 201412111205  |d shahrim  |c 201412111205  |d shahrim  |y 201410131148  |z hasniza 
040 |a UPNM 
090 |a TK 5105.59  |b .S725 2014 
100 1 |a Stallings, William 
245 1 0 |a Network security essentials  |b applications and standards  |c William Stallings. 
250 |a Fifth edition, international edition 
260 |a Harlow, Essex  |b Pearson Educational Limited  |c 2014 
300 |a 445 p.  |b ill.  |c 23 cm. 
504 |a Includes bibliographical references and index. 
505 0 |a Ch. 1 Introduction -- Pt. 1 Cryptography -- Ch. 2 Symmetric Encryption and Message Confidentiality -- Ch. 3 Public-Key Cryptography and Message Authentication -- Pt. 2 Network Security Applications -- Ch. 4 Key Distribution an User Authentication -- Ch. 5 Network Access Control and Cloud Security -- Ch. 6 Transport-Level Security -- Ch. 7 Wireless Network Security -- Ch. 8 Electronic Mail Security -- Ch. 9 IP Security -- Pt. 3 System Security -- Ch. 10 Malicious Software -- Ch. 11 Intruders -- Ch. 12 Firewalls -- App. A Some Aspects of Number Theory -- App. B Projects for Teaching Network Security -- References -- Index. 
520 |a Intended for college courses and professional readers where the interest is primarily in the application of network security, without the need to delve deeply into cryptographic theory and principles (system engineer, programmer, system manager, network manager, product marketing personnel, system support specialist). A practical survey of network security applications and standards, with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards , Fifth Edition provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. Adapted from Cryptography and Network Security, Sixth Edition, this text covers the same topics but with a much more concise treatment of cryptography. 
592 |a 00013854  |b 25/11/2014  |c RM79.95  |h PVK 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
999 |a vtls000052903  |c 98974  |d 98974